0% found this document useful (0 votes)
681 views

Installation and Configuration of Lansweeper

The document provides instructions for installing and configuring Lansweeper software for network scanning and asset management. It outlines prerequisites like supported operating systems and software. It describes configuring the database server, installing Lansweeper components, and logging into the configuration console. Numerous options are covered like active scanning, scheduled scanning, scanning credentials, exclusions, reports, alerts and more. Advanced premium tools are also highlighted.

Uploaded by

Gansari Gheorghe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
681 views

Installation and Configuration of Lansweeper

The document provides instructions for installing and configuring Lansweeper software for network scanning and asset management. It outlines prerequisites like supported operating systems and software. It describes configuring the database server, installing Lansweeper components, and logging into the configuration console. Numerous options are covered like active scanning, scheduled scanning, scanning credentials, exclusions, reports, alerts and more. Advanced premium tools are also highlighted.

Uploaded by

Gansari Gheorghe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

www.lansweeper.

com

Installation and configuration of Lansweeper

Installation and configuration of Lansweeper ............................................................................................ 1


Prerequisites ........................................................................................................................................ 2
Configuring the database server (sql server 2005 and above) .................................................................... 3
Installing Lansweeper ............................................................................................................................ 4
Logging on to the Configuration Console ................................................................................................ 10
Configuring all scanning options. .......................................................................................................... 11
Scanning option: Active scanning.......................................................................................................... 12
Scanning option: IP range scanning ...................................................................................................... 13
Scanning option: Scheduled Eventlog scanning....................................................................................... 13
Scanning option: Scheduled scanning .................................................................................................... 14
Scanning option: Lsclient.exe ............................................................................................................... 15
Scanning with alternate credentials ....................................................................................................... 18
Troubleshooting connection problems. ................................................................................................... 19
Configuring scanning time interval options ............................................................................................. 20
Configuring scanning exclusion ............................................................................................................. 21
Recovering product license keys ........................................................................................................... 22
Configuring Internet explorer to allow custom actions ............................................................................. 23
Configuring Firefox to allow custom actions ............................................................................................ 24
Permanently deleting computers and devices. ........................................................................................ 25
Creating reports and changing the dashboard ........................................................................................ 26
Creating E-mail report alerts ................................................................................................................ 29
Creating E-mail eventlog alerts ............................................................................................................. 30
Ignoring eventlog events ..................................................................................................................... 31
Configuring software license usage ....................................................................................................... 32
Configuring operating system license usage ........................................................................................... 33
Implementing custom actions ............................................................................................................... 34
Configuring extra scanned files ............................................................................................................. 36
Configuring extra scanned registry keys ................................................................................................ 37
Configuring allowed local computer administrators .................................................................................. 38
Configuring allowed (safe) software ...................................................................................................... 38
Configuring Asset tag links ................................................................................................................... 39
Upgrading to the premium version ........................................................................................................ 39
Adding user pictures to the web interface .............................................................................................. 40
Premium tool: Lstrigger - triggered scanning of computers. ..................................................................... 41
Premium tool: Remote screenshot - see what’s on a remote computer screen. ........................................... 42
Premium tool: Remote control - Take remote control of your workstations by pushing VNC.......................... 43
Premium tool: Remote software uninstall – list and uninstall software on remote computers. ....................... 44
Premium tool: Lsrunase : encrypted runas tool....................................................................................... 45
Premium tool: Supercrypt : enhanced encrypted runas tool. .................................................................... 46

1/46
www.lansweeper.com

Prerequisites

Web server:
Windows 2000 or higher with Internet Information services installed or the Lansweeper build-in web server.
The dotnet framework 2.0 installed (latest service pack).

Server where the Lansweeper service is installed:


Windows 2003 or higher. (Or optionally windows XP or higher)
The dotnet framework 2.0 installed.

Database server:
Windows 2000 or higher (32 and 64 bit)
SQL server 2000 SP4 or higher (or the free SQL express)

Clients:
Windows 2000 and above
(Windows 9x clients are not supported)
Evenlog scanning is not supported on windows 2000.

In this example the web console, database and service are installed on the same machine.

Server name: myserver


Domain: lansweeper.local
NetBIOS domain: lansweeper

You can contact lansweeper if you have any questions or problems:

Website: http://www.lansweeper.com

Support: http://www.lansweeper.com/forum

Lansweeper sales & reseller questions: lansweeper@hemoco.com

Skype : Lansweeper

2/46
www.lansweeper.com

Configuring the database server (sql server 2005 and above)

This is only required if you install Lansweeper in a multi-tier setup!

SQL server 2000 doesn’t need any extra configuration.


If you don’t have a database server the setup will install one for you.

Open the “SQL server configuration Manager”

Enable “Named Pipes” and “TCP/IP”

Set the SQL server Browser to automatic and start it (if not already started)
Restart the SQL service.

3/46
www.lansweeper.com

Installing Lansweeper

Click next to continue

Accept the agreement and click next to continue.

4/46
www.lansweeper.com

You can choose to install Database, Service and Website on different servers if you want; in this example we are
going to install everything on one server.

Choose your SQL server and authentication method.


If you don’t have any sql server, setup will install SQL Express (free)

If for some reason you cannot connect to your sql server:

Sqlcmd: Error: Microsoft SQL Native Client: An error has occurred while establishing a connection to the server. When
connecting to SQL Server 2005, this failure may be caused by the fact that under the default settings SQL Server does not
allow remote connections.

See this knowledgebase article: http://support.microsoft.com/kb/914277/en-us

5/46
www.lansweeper.com

Running the setup in a domain or workgroup will give different options:

The user running the service should have administrative privileges on all clients being scanned by
lansweeper.

This is typically a domain administrator account.


If you have a workgroup you will need an account with the same username/password on all machines.

Workgroup:

Domain:

6/46
www.lansweeper.com

Use IP scanning to discover devices in your network (printers, routers, …)


If you don’t have an active directory domain you can also use IP scanning to discover windows machines.

If IIS is installed the installer will suggest to use this as a web server.

If you are already using any web applications on the server we recommend creating a new website on a new port.

If IIS is not installed you can choose the lansweeper build-in web server.

7/46
www.lansweeper.com

Choose a location to install and click next to continue.

When setup completes you will be able to subscribe to our newsletter to get news about updates, patches &
tutorials.
(Not required but recommended)

8/46
www.lansweeper.com

Click finish to end the installation.

Check if the service is running:

Surf to your server where the Lansweeper service is running (not the website) http://servername:9524

If there are any errors, the errorlog.txt file is in your service folder:

9/46
www.lansweeper.com

Logging on to the Configuration Console

Server: your SQL-Server


Database: lansweeperdb

You can use integrated authentication or you can connect with a username and password:

Username: lansweeperuser
Default password: mysecretpassword0*

You can change the default password of the SQL user later if you want.

10/46
www.lansweeper.com
Configuring all scanning options.

If you have the enterprise your can have multiple scanning servers each with their own configuration.
If you want to use e-mail alerts it’s important to specify an e-mail relay server in your configuration.

If you want to change the lansweeper port or concurrent scans you will need to restart your service after saving
the changes.

11/46
www.lansweeper.com

Scanning option: Active scanning


Available in trial and premium versions of Lansweeper.

Active scanning allows you to scan multiple domain and selected OU’s without the need to install any client on the
workstations.

Active scanning works like a “set it and forget it” option, it will query your domain controllers to find out recently
connected workstations and servers.

If you have an active directory domain then active scanning is recommended.

There is no client or extra software needed on your computers.

12/46
www.lansweeper.com

Scanning option: IP range scanning


Available in trial and premium versions of Lansweeper.

IP range scanning can discover network devices in your network which have the SNMP, SSH, HTTP, HTTPS, FTP,
SMTP, SIP, Telnet or Jetdirect protocol enabled.

If you are scanning a workgroup you can also discover and scan windows computers.
There is no client or extra software needed on your computers.

Multiple default domains and credentials can be configured for each IP range.

Scanning option: Scheduled Eventlog scanning


Available in trial and premium versions of Lansweeper.

Use this scanning option to incrementally update your server’s eventlog and generate the necessary alerts in time.
There is no client or extra software needed on your computers.

13/46
www.lansweeper.com

Scanning option: Scheduled scanning


Available in trial and premium versions of Lansweeper.

Scheduled scanning allows for scanning computers, complete domains or OU’s at scheduled time intervals.
There is no client or extra software needed on your computers.

14/46
www.lansweeper.com

Scanning option: Lsclient.exe


Available in all versions of Lansweeper.

Although the name would suggest otherwise lsclient.exe is no real client or agent.
Basically it just sends a message to the server “hello, I’m here, scan me on this IP Address” and stops working.
The service queue’s this request and starts scanning the client when ready.
All the scanning is done by the lansweeper service.

Lsclient is the only scanning option in the freeware lansweeper version.

Lsclient.exe is copied to your installation folder

Usage: Lsclient.exe “name of server where the service is installed”

As a test we try from the command prompt:

“C:\Program Files\lansweeper\Client\lsclient.exe” myserver


or
“C:\Program Files\lansweeper\Client\lsclient.exe” myserver /showresult

/scanonip is a new option. You can use it if you have vpn clients and want to scan them on the IP address they
currently have without the need to have DNS updated.

15/46
www.lansweeper.com
How to use lsclient in a standard login script?

In this example the startup script is called “startup.cmd”

Contents of the startup.cmd

%logonserver%\netlogon\lsclient.exe myserver

Now copy the lsclient.exe to your netlogon folder.

16/46
www.lansweeper.com
Deploying lsclient by using a GPO

More technical info on: http://support.microsoft.com/kb/322241/en-us

Make sure that you use a logon script instead of a startup script because this is running in the context
of the user.

A sample vbs script that runs the lsclient hidden could look like this:

Set WshShell = CreateObject("WScript.Shell")


WshShell.run "%logonserver%\netlogon\lsclient.exe myserver",0

17/46
www.lansweeper.com

Scanning with alternate credentials

On this page you can specify alternate credentials to scan other domains and forests.

If you want to use credentials from a computer that cannot be verified (example: a DMZ standalone computer) you
can check the box “Don’t try to authenticate username\password”

18/46
www.lansweeper.com

Troubleshooting connection problems.

You can connect from the server to one of the clients to check if the WMI settings and access permissions are ok.

The test checks if WMI access and registry access using WMI
is possible.

If you find error errors please visit our knowledgebase

Errors are almost always caused by these problems:

• Windows firewall or other firewall blocking access.


• Dns problem: Dns points to a wrong IP address.
• WMI and Dcom is not enabled on the client.
(in a default windows installation this is enabled)
• Access denied: the server user does not have
administrative permissions on the client.

If you have checked our knowledgebase and didn’t find an


answer, please visit our support forum
http://www.lansweeper.com/forum

19/46
www.lansweeper.com

Configuring scanning time interval options

This table defines when each item is scanned.


-1 = Disable scanning for this item.
0 = always scan this item.
X = every x days.

For example:
Cdrom = 60
Information about cdroms is only scanned every 60 days.

20/46
www.lansweeper.com

Configuring scanning exclusion

If you wish to exclude some computers from scanning you can add them to this list.

21/46
www.lansweeper.com

Recovering product license keys

You can enable/disable product keys you want scanned.


This list is extendable to add future product keys.

3 types of keys are currently supported: Plain text, Microsoft and Adobe.
Keys in the HKEY_CURRENT_USERS registry key are not supported.

22/46
www.lansweeper.com

Configuring Internet explorer to allow custom actions

Make sure that the activeX controls are enabled.

You can add your website to the trusted sites for security reasons.

Go into Security Settings - trusted sites.

Change the following setting to "Enable"


[Initialize and script ActiveX control not marked as safe.]

23/46
www.lansweeper.com

Configuring Firefox to allow custom actions

First download the plugin from http://www.lansweeper.com/firefoxplugin.zip

nplansweepershellexec.dll should be placed in your Firefox Plugins folder

Afterwards restart Firefox if it was running.

You can disable/enable the plugin afterwards from the firefox menu/tools/add-ons.

24/46
www.lansweeper.com

Permanently deleting computers and devices.

Select all the computers in the grid (ctrl & shift) for multiple selections.

Click the “permanently delete selected computers” button.


This will delete the computer details and all related information from your database.

You can do the same for Devices.

25/46
www.lansweeper.com

Creating reports and changing the dashboard

With the dropdown box you can select from all the available reports in the database.

Sort order = the lower the number, the higher the report will be displayed in the interface
Priority 1 : High priority
Priority 2 : Important
Priority 3 : Informational
Color = show in red if the report contains items
Show % = shows the percentage of computers contained in this report

26/46
www.lansweeper.com
Creating your own reports

In this example we will create a sample report.


We want to display all software found in our network from the publisher “Apple Inc.”
To create a new report right click on the report list and click “New Report”

27/46
www.lansweeper.com

Drag the 2 needed table “tblcomputer” and “tblsoftware” to the query builder and select the needed fields.

Let’s filter out software only from “Apple Inc.”

Let’s save our report and give it a name:

Our report is now available and can be exported to Excel, Csv, XML, …

You can also add the report to the web interface.

28/46
www.lansweeper.com

Creating E-mail report alerts

First we need to create mailgroups.


One mailgroup can contain multiple e-mail addresses if you separate them with a “;”

When this is done we can select the reports we want e-mailed en choosing a group for them.
Selected reports will be mailed each night if they contain any results.
Empty reports will not be mailed.

Don’t forget to configure a mailserver and enable report mailing !

29/46
www.lansweeper.com

Creating E-mail eventlog alerts

If you want to receive e-mail alerts if an error happens on one of your servers you can use the eventlog alerts.
You can specify multiple alerts each with their own mailgroup and filters.

Don’t forget to configure a mailserver and enable eventlog mailing !

30/46
www.lansweeper.com
Ignoring eventlog events

Some recurring warnings can fill your database quickly.


If you want to ignore recurring warning then you can create a filter for them.
The ignored events will never be saved in the database.

31/46
www.lansweeper.com

Configuring software license usage

On the left you see all the software found in your network.
If you want to track license usage of a software item, you can select it and add it to the list of tracked software.

# Purchased : amount of licenses that you bought for this product.


# Price: price for one license.

In the details you can select multiple versions and products for one license type.
You can use the wildcard ‘%’ in the version to specify multiple versions.

32/46
www.lansweeper.com

Configuring operating system license usage

On the left you see all the windows operating systems found in your network.
If you want to track license usage of an operating system, you can select it and add it to the list of tracked
Operating systems.

# Purchased : amount of licenses that you bought for this product.


# Price : price for one license.

33/46
www.lansweeper.com

Implementing custom actions

Computer actions:

Description: what appears in the web interface


Action: the command to execute
Variables: {computer}, {domain}, {username}, {userdomain}, {tag}, {ipaddress}, {fqdn}, {actionpath}
Icon: which icon to show in the interface.
Sort order: the lower the number, the higher the report will be displayed in the interface
Enabled: show this action in the interface
Confirmation: ask for confirmation before executing this action.
Advanced: show in the basic or advanced section.

User actions:

Variables: {username}, {userdomain}, {displayname}, {telephone}, {fax},


{mobile},{email},{OU},{cn},{actionpath}

34/46
www.lansweeper.com

Device actions:

Variables: {ipaddress}, {actionpath}

You can add your own icons to the “actions” folder in the web folder.

35/46
www.lansweeper.com
Configuring extra scanned files

Filename : you can use 2 parameters : %programfiles% and %windir%


Enabled : scan for this file.

File size, company, version and other info is scanned for this file.

Results of these file scans can be used to create custom reports using the premium report builder.

Examples:
Which computer doesn’t have the latest version of Firefox installed?
Which computer doesn’t have the latest version of Antivirus scanner X?
Which computer doesn’t have the needed DLL for application X?

36/46
www.lansweeper.com

Configuring extra scanned registry keys

Rootkey: select the rootkey in the remote registry


Regpath: select the path to scan
Revalue: select the value to scan
Enabled: enable scanning of this item

37/46
www.lansweeper.com

Configuring allowed local computer administrators

Add all users that are allowed to be local administrator on their computer to this list.
This will help you with the report : “Not allowed local administrators”

Configuring allowed (safe) software

Add all approved and safe software to the list.

This will help you to find “illegal” software usage.

38/46
www.lansweeper.com

Configuring Asset tag links

You can use the {assettag} and {model} parameter to link to computer vendors support pages.

Upgrading to the premium version

After purchase you will receive a license key which you can copy/paste into this screen.

If you can’t find your license key, please contact us at lansweeper@hemoco.com and provide your orderID.

39/46
www.lansweeper.com

Adding user pictures to the web interface

If you want to add pictures for your users you can add them in the pictures folder of your web server:

Folder = NetBIOS name of your domain (change this to reflect the name of your domains)
Picture = username.jpg (SamAccountname)

40/46
www.lansweeper.com

Premium tool: Lstrigger - triggered scanning of computers.

Use this tool to force/trigger remote scanning of a workstation from the command line.

Example:
lstrigger "servername" "computer" "domain"
Default port = 9524

lstrigger "servername" "computer" "domain" "port"

C:\>lstrigger myserver lansweeper-001 lansweeper

Change “servername” to the name of the server running your lansweeper service.

When you trigger a scan all information for this computer is rescanned regardless of the waittime set.

Lstrigger only works on computers that are already in the database.

41/46
www.lansweeper.com

Premium tool: Remote screenshot - see what’s on a remote computer screen.

• Client requirements : Windows 2000 or higher


• No need to install software on the client.
• Both machines should be in trusted domains.
• The user should have administrative privileges on the client.
• TCP ports 139, 445 should be open on the server from the client.
• The “Server” service should be running on the target machine.
• The “Remote registry” service should be running on the target machine.
• The Default shares should be available on the client (C$, admin$)

You can also use this program from the command line or from the action screen.

Usage:
screengrab.exe {computer}

42/46
www.lansweeper.com

Premium tool: Remote control - Take remote control of your workstations by pushing VNC.

Remote control the screen of your workstations to give them remote support.
The free VNC service is automatically pushed to the client on first use.

• Client requirements : Windows 2000 or higher


• No need to install software on the client.
• Both machines should be in trusted domains.
• The VNC service is pushed to the client and removed after the remote control session.
• The user should have administrative privileges on the client.
• TCP ports 139, 445 and 5900 should be open on the server from the client.
• The “Server” service should be running on the target machine.
• The “Remote registry” service should be running on the target machine.
• The default administrative shares should be available on the client (C$, admin$)

You can also use this program from the command line or from the action screen.

Usage:
lsremote.exe {computer}

43/46
www.lansweeper.com

Premium tool: Remote software uninstall – list and uninstall software on remote computers.

You can also use this program from the command line or from the action screen.

Usage:
remoteuninst.exe {computer}

The only requirement is WMI and administrative rights on the remote computer.

There are 3 types of software:

MSI packages:
These are uninstalled by the MSIexec command.
Adding the /QN /NORESTART parameters makes the uninstall invisible to the remote users.

Other installers:
They might have optional parameters to run the uninstall hidden but this depends on the software and is not
always available.

Not allowed to remove:


Some software is not allowed to be removed by the software vendor because it will most likely break windows
functionality.

44/46
www.lansweeper.com

Premium tool: Lsrunase : encrypted runas tool.

LSrunase 2.0 can be used to run a command using another user account and passing the password as a
parameter.

Parameters:
1e parameter: specifies the username
2e parameter: specifies the domain
3e parameter: specifies the encrypted password
4e parameter: specifies the command
5e parameter: specifies the optional parameters

Examples:
lsrunase administrator Mydomain vA0j26NYqfc= notepad.exe

lsrunase administrator Mydomain vA0j26NYqfc= "C:\Program Files\Internet Explorer\iexplore.exe"

lsrunase administrator Mydomain vA0j26NYqfc= "C:\Program Files\Internet Explorer\iexplore.exe"


"http://www.google.be"

45/46
www.lansweeper.com
Premium tool: Supercrypt : enhanced encrypted runas tool.

Supercrypter 2.0 makes encrypted .lsc files based on your input

In this example we make the notepad.lsc file to start notepad with administrator privileges.

You can then use these encrypted .lsc files with Supercrypt to run the chosen program using the chosen account.

The executable variable makes sure that only the intended program can be run as administrator.
The technique for doing this is calculating the MD5 hash value of the executable (in this case notepad.exe).

Supercrypt makes sure that the user can only run the program it was intended to run!

Supercrypt has the following parameter:


1e parameter : specifies the .lsc file (create the file with SupercryptER)

Example:
supercrypt "c:\notepad.lsc"

46/46

You might also like